Hacking Using Metasploit with OTW (Linux Tutorial)
ฝัง
- เผยแพร่เมื่อ 12 ก.ค. 2024
- Excited to share a new video where I collaborate with master hacker OccupyTheWeb (OTW) to dive into the essentials of Metasploit. It's a straightforward guide aimed at enhancing your cybersecurity toolkit. Check it out for insights that bridge theory with practical application. #Cybersecurity #Metasploit #occupytheweb
OccupyTheWeb Books - Affiliate links:
1. Become a master Hacker - amzn.to/3Eq6vX4
2. NEW BOOK - Network basics for hackers - amzn.to/3YNd1iz
3. Linux Basics for Hackers - amzn.to/3Sdoh5i
OccupyTheWeb Community - Hackers-Arise: - 20% coupon for everything in store ("YANIV")
Chapters:
0:00 - 1:40 Opening OCTW
1:40 - 5:48 Metasploit Meaming
5:48 - 7:20 Metasploit Exploits
7:20 - 12:02 Metasploit Servers+
12:01 - 13:00 Target System
13:00 - 23:48 Payloads
23:48 - 48:56 Indicators and More Tutorial
Watch more cyber security Video's
1. Does SQL injection still work ? Lessons by Master Hacker - • SQL for Hackers by Mas...
2. Behind Darknet Diaries with Jack Rhysider - • Jack Rhysider Darknet ...
3. Shield Your Wi-Fi from Hackers with these Essential Security Measures • Hacking home WIFI with...
4. Meet the man who exposed the world's first cyber weapon - • Unraveling the Impact ...
5. How to become a master hacker (With OTW) - • how to become a master...
6. Hacking SCADA systems - • hacking industrial con...
7. SW define radio hacking - • radio hacking with a m...
8. Pegasus spyware - • pegasus the spyware te...
9. Stuxnet - • Explaining cybersecuri...
10. API Hacking - • How Hacking APIs Works...
11. DNS Hacking - • DNS hijacking | Cybers...
12. How to Build a hacking Box - • how to build your hack...
13. NotPetya - • notpetya attack
14. OSINT - Open Intelligence tools - • OSINT framework Explai...
My channel contains videos about cybersecurity fundamentals, such as cloud computing, cloud networking, ethical hacking, infosec, IT security, and machine learning.
Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: cutt.ly/YanivHoffman
Thank you for being here!
Stay Safe and Healthy,
Yaniv Hoffman
#cybersecurity
#occupytheweb
#informationtechnology - วิทยาศาสตร์และเทคโนโลยี
Such an amazing video successfully ruined by the music in the background
Thx for the feedback….. Appreciate it as I want to learn and improve
I like the song it just needs to be lower than your voice
Thx a lot for it from few and appreciate the feedback ❤️
It's not as bad as they make it seem haha. Great video
@@bunnyslayer14 Non native English speakers may have difficulty understanding what's being said with the music playing at the music to speech ratio in this video, especially if they have little exposure to the terms being used.
תודה יניב . מחכה בקוצר רוח לכל סרטון שיוצא . כל אחד יותר טוב מהשני תודה מלך❤
תודה רבה , מאד חשוב לי לשמוע ❤️
Hi Everyone, my latest video with OTW about Metasploit fundamentals . Enjoy !
Amazing video, i just started reading OTW's books and my brain is like 🤯
Great! Thx for watching
Where is the link to the book?
@@samha1513 in the description of the video
@@yanivhoffman thanks got it.
Love the simple explanation provided here about Metasploit 👍
More videos like this please
Thx for watching and nice feedback
Superb content as always, thank you Yaniv!
Thx so much Roy ❤️
Definitely. Amazing video but music is too loud and annoying. Love his channel though will continue to watch.
yes apologise. got many similar feedbacks and will correct
Awesome video and editing 😮
Thx a lot
Appreciate it
great introductory video for this great tool. thanx
Thx a lot my friend
more subs ahead,you really deserve it
Thx a lot man ❤️
Surprisingly, the music kept me in suspension and awake, good taste.
Many complain on music so we aligned it in new videos but good to hear it helped here 😆
The video was excellent and very informativ.
Thank you for watching . Music didn’t bother you? I got many complaints
There's hackers then there's occupy the web. Next level dude,
🔥🔥🔥🔥🔥🔥
Awesome video.
Thx a lot
thanks, needs more sir.
Thx for watching ❤️
Great video!!! love the background music
Thx so much 🙏
Very nice tutorial.
Thx 🙏
Let’s gooo!
Lets Gooooo🔥🔥🔥
very useful, thank you so much.😁😁😁
Thx for watching
אלוף!
היי ממש תודה ❤️
thank you Yaniv for the video . Note , the Otw website is chaotic , i couldn't understand what subscription to choose , i hope otw see this comment to update his website for a better one
Hi buddy , long time. How are you ? I will forward the message. You can write me in private what are you looking for and I will guide you and help you
@@yanivhoffman am fine , hope you do well , thank you Yaniv , i will send you in privet... 😃
Love OTW content. I would like to have the music turned down a notch as it is slightly distracting to me. Otherwise great stuff!!!
Thx a lot for similar comments and definitely will learn for the future
@@yanivhoffman thank you for the response!!! Look forward to more content.
yeah i have that book>!
really cool video, just wished if the music sound was lower, or i personally prefer no music at all.
Thx so much. Indeed we had a rare issue with music so it impact the enjoyment of the video. Thx for the feedback…
thanks
Thx for watching ❤️
מת עליך יניב
תודה רבה ❤️
Should I do port forwarding to us metasploit
What editing software is this?
תודה!
ואהוו ❤️❤️❤️
A Quote & A Question
Quote: "A door once opened may be stepped through in either direction."
Question: Are these types of attacks like open doors? Whereby either side can step through, so that if the victim is aware and has the right tools can take over the attacker's system and give 'em a dose of their own medicine? AND if not, then how can we make so?
~ Tifkat
*Quote Citation: Reinette, The Girl in the Fireplace, Doctor Who.
You need to make a playlist for a complete beginner. Also, maybe a knowledge roadmap, not a certification roadmap.
great idea - will think about it
You cant run http on any port. Im not sure why the professional hacker said that.
You can’t indeed. You remember which part you heard it ? I will check again. Thx for your feedback , appreciate it
Somewhere after the 33 minute mark
33:47
Port 80 and 8080 is the only ports accepting http while 443 is for https and https can use 8080 as well. Any other port uses TCP and Udp with other forms of udp for all other ports. Which is at least what I've been told.
@@Darkregen9545 thx for the pin point. I will check it out. But in general - Yes, HTTP can run on ports other than the standard port 80. Port 8080 is a popular alternative, especially for development environments, proxy servers, or when the standard port is already in use or restricted. In fact, HTTP can run on virtually any port, as long as the client and server are configured to communicate over that specific port. Ports like 8080, 8000, and 8888 are commonly used alternatives for various purposes, including testing or running secondary web servers. So maybe it was not clarified enough
😃👍
It should be great if you remove the background music from your video, cause it make it less clear to ear 100% of what OTW say!
Yes learned from this mistake. Will not happen again
Does anyone know how to install kali in vps please need a video.
First!
Nice ! ❤️
Dude there is a huge window of text over your video, blocking the view
New trick
Thx a lot
Next Video how to control security for iOS
Good ideas 💡
The website isn’t working for me
which one? what exactly doesnt work?
@@yanivhoffman otw website is down
How do I hack website for doing illegal activity
We only educate on ethical hacking here , sorry
@@yanivhoffman U can help me their doing illegal activity
@@yanivhoffmanI think he means that the website is doing unethical illegal activity, and he wants to stop it using hacking skills! Like DDoSing the Church of Scientology!
@@yanivhoffman Why not these people are doing illegally no one is doing anything about it so why not help me do something about people doing illegal activity on the website
@@yanivhoffman Help me so I can stop their doing illegal activity
the background music is so distracting cant hear OTW
Yes terribly apologize . This will not happen again. We had some internal issue on our system and only after upload we notice and got many other feedbacks. So sorry
it's all good! I am still watching @@yanivhoffman
OCTW ? not... is OTW
Yes thumbnail will get update
great video but i have few comments. 1. nmap is very noisy, IDS or similar system will detect it so even with -T0 switch. 2. background music in this video is not in background so much so i had trouble to hear OTW
Thx a lot for this great feedback. On music I also got few other comments so taking it as something I will change or avoid in future. Thx a lot
Please Bro How to get Netflix Premium accounts for free?
Metasploit is always something I've seen as a training tool and nothing there really works on an even remotely hardened system.
Ok more malware Protection with sandbox end endpoint Security
Ok wait for upcoming video with Filipi Pires on malware coming at of this week
@@yanivhoffmanok
@@yanivhoffmanok hacking me i calling the police
@@iamwitchergeraltofrivia9670 hahah only ethical hacking for educating . I don’t promote or support hacking without permission.
Music kills this video never play music when a Master is talking show respect.
True and will not happen again
Plss remove bg music
yes I know. we did mistake there
the music is so annoying
Yes sorry for that. We learned from our mistake
The music is stupid
why is the entire world stupid and uses this framework for exploits ? metasploit have taken over the exploit "marked" ,, i dont like it,, its seriously stupid to LOGIN ,,, and id'ing yourself , and reaching out to metaspolits database anytime u want to hack anything,, and not a single video i see of metasploit usage even mentioning it.. im old school,, i hate metaspolit, it have ruined the way exploits are made, used. and abused. its a tragedy.
Im old school as well
@@yanivhoffman oh video creator himself replying, cool. that do give me a chance to ,, well,, first confess i did not see all 48 minutes, and still go on to ask ,, did you warn people that metasploit is ,,, not a smart tool to use if you actually want to hack someone and not get caught ?
seeing how 99& of metaspolit users will be signed in and identifiable in 99 more different ways by using metasploit , than by downloading a exploit from some "random" website, compiling it, running it.
are you not sad to the core by thinking about how many young people falls into the trap of using this framework out of curiosity and getting them self caught ,, just for the share single purpose of your own amusement so you can present your self as a "ethical" person making a video ?
saw video from beginning now, yea think we about same age old timer.
have not seen all still but, i think my main question still is ,
how you going to execute metaspolits payloads from a remote machine ? im not going to load it up from my own machine if i am breaking into ,, anywhere real that is not my own home lab..
every video i see the video creator have kali pre installed and all is ready to go. nobody says anything about real world examples.
@@yanivhoffman oh reply from the creator,, great, let me use the chance.
I looked at your face i think, and yea well we about same age.
Do you not have any empathy for the young children that will see your video and think
"aah metasploit is a good thing to use on my local computer where i am logged in" and identifiable in 99 more ways, than they would be if they did things properly and had a remote machine they launched they'r exploit from ? u know,, to downloaded some exploit from some site , compiled it manually , run it. not saying that everyone needs to learn to compile but,
in real world when you not sit in your lab , you do not have a metasploit framework on the compromised machine. you have wget if you lucky.
why ,, and how how ,, have the entire world gone insane with this whitehat metasploit school crap?
it is a badly made framework that barely holds together, that are for nobody but blue team \ whitehat \ double morale snake face people that do not think very far ahead
or so i think..
but then again, the all oldest largest exploit publishers are also supporting metasploit exploits so,,, i dunno what to really think but,
i do think that is under a lot of influence of big tech companys like google.
i just dont think its a good thing...
do you have any other inputs on this,, besides that your a old timer too ?
All metasploit hashes are already detectable by every antivirus software. Actually establishing a reverse shell on a real life target would be extremely difficult
It's only detectible if you use it out of the box...you have to modify the payload obviously before attacking so the hash and everything are different and undetectable...not that hard if you know what you're doing...pen testers and black hats alike use metasploit all the time, but keep in mind that it's open source so millions of different "versions" probably exist
@@bunnyslayer14 hashing isn't the only way to detect a payload there are heuristic based detection and other ways for an antivirus to catch a payload. Especially when they do pattern based payload detection there's only so many ways to obscure
@@bunnyslayer14 and Metasploit works
less well for Windows because it lacks a lot of post-exploit modules that are readily available in other frameworks, and the techniques employed by the meterpreter are first on the checklist of every antivirus software out there - "Hack like a Ghost" - SparcFlow